Shaarli export of all bookmarks on Thu, 17 Jan 19 08:09:10 -0500
- Thank You, John C. Bogle — My Money Blog
- Collection 1 data breach covers more than 772 million email addresses
- Cloud Computing TECHREPORT - 2018 ABA Survey Results | DennisKennedy.Blog
- Introduction to Ubuntu's LXD Containers - Make Tech Easier
- Chart: Stock Market Declines Are More Common Than You Think — My Money Blog
- Ryuk ransomware banks $3.7 million in five months
- Is GDPR Compliance Tougher Than HIPAA Compliance?
- Lessons From Report on Massive Singapore Healthcare Hack
- Government Shutdown: Experts Fear Deep Cybersecurity Impact
- Tom Kellermann
- Patch Tuesday, January 2019 Edition — Krebs on Security
- Ransomware Attacks: The Data Integrity Issues
- The 2019 Health Data Privacy Regulatory Outlook
- Cyber resilience and the GDPR - IT Governance Blog
- ITIL 4: What you need to know about the 2019 ITIL update - IT Governance Blog
- 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2) 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2)
- SMB Penetration Testing (Port 445)
- Windows Applocker Policy - A Beginner’s Guide
- How To Change E1000 into VMXNET3 without changing a MAC address | ESX Virtualization
- From Encrypting the Web to Encrypting the Net: A Technical Deep Dive on Using Certbot to Secure your Mailserver | Electronic Frontier Foundation
- OpenMediaVault – Good Times With mdadm | PenguinPunk.net
- January 2019 patchday issues | Born's Tech and Windows World
- Humana Breaches Reflect Chronic Credential Theft in ...
- Who Takes Responsibility for Cyberattacks in the Cloud?
- What’s wrong with patch-based Vulnerability Management checks? | Alexander V. Leonov
- Blowing the Dust off of an IBM AS/400 Server | Hackaday
- Resolving Microsoft SQL Server Error 4064 with PowerShell – Mike F Robbins
- The Biggest Storage Trends of 2019 | Architecting IT
- What Makes IoT A Security Risk? | The Networking Nerd
- Configuring TACACS+ Server on Ubuntu 14.04LTS – Keeran's Blog
- CLOS Topology
- Firewall Ruleset Automation with CI Pipeline « ipSpace.net blog
- How to configure Windows 10 in Kiosk Single App, full-screen mode
- Just one more esxi-guy: The D.C.L.I. (Datacenter CLI)
- Stanford uploads 111 lectures by Donald Knuth. – Virtually Fun
- Taking a look at AutoDeploy in vSphere 6.5
- Tiger - The Unix Security Audit and Intrusion Detection Tool
- Tiger - The UNIX Security audit and intrusion detection tool
- How to Set Up a Local DNS Resolver on Ubuntu 18.04, 16.04 with BIND9 - LinuxBabe
- Am I financially independent? (And does it matter?)
- CVE Vulnerabilities: All You Ever Wanted to Know About
- Top Ways to Get ROI From Your AppSec Program - Security Boulevard
- Kubernetes: Master Post Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
- Top 5 things SMBs should consider when evaluating a cybersecurity strategy | Webroot
- All About the Hotspot Honeypots - Security Boulevard
- How to data breaches happen - Security Boulevard
- Sometimes A Vulnerability Isn’t So Vulnerable
- pfSense VLANs on Proxmox - Linux Included
- SSHGuard settings on pfSense - Linux Included
- Healthcare Continues to Be Prime Target for Cyber Attacks
- SlackPirate - The Slack Enumeration and Extraction Tool - emtunc's Blog
- Using Ansible to bring up a three node Patroni cluster in minutes - Blog dbi services
- GitHub - danluu/post-mortems: A collection of postmortems. Sorry for the delay in merging PRs!
- Reading postmortems
- Verizon FiOS – ICMP Traceroute Issues
- Too much disk IO on sda in RAID10 setup | blog.windfluechter.net
- How to be More Productive by Using the “Eisenhower Box”
- GDPR Myth #1: Fine of 4% of global turnover for your first GDPR offence | VinciWorks Blog
- Senators Demand Voting Machine Vendor Explain Why It Dismisses Researchers Prodding Its Devices
- Displaying IP Info on Console with Netplan – Fixing IT
- Julia Reda – In January, the EU starts running Bug Bounties on Free and Open Source Software
- TheHive Project – Open Source, Free and Scalable Cyber Threat Intelligence & Security Incident Response Solutions
- Tesla Model 3 known good accessories | TinkerTry IT @ Home
- PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Tesla Model 3 replacing my 13 year old Honda Civic Hybrid, let's see how that goes. So far, so good! | TinkerTry IT @ Home
- 7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions - Data Security Blog | Thales eSecurity
- Docker Security Tips & Best Practices – Threat Stack
- Healthcare IT Continues to Struggle with Backup Strategies - Security Boulevard
- 9 Benefits of ISO 27001 Certification (Some You Know, Some You Probably Don’t) | Pivot Point Security
- Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack — Krebs on Security
- MISP - Malware Information Sharing Platform and Threat Sharing - The Open Source Threat Intelligence Platform
- The Docker Bench For Security - A Script That Checks For Dozens Of Common Best-Practices Around Deploying Docker Containers In Production - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- XSRFProbe - The Prime Cross Site Request Forgery Audit And Exploitation Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The 4 stages of cyber resilience - IT Governance Blog
- The End (of 2018) Is Near: Looking Back for Optimism
- New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
- New cybersecurity rules take effect in South Carolina
- Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients - HICP-Main-508.pdf
- Analyzing the Portuguese DPA's first GDPR fine
- Marriott Provides Update on Starwood Database Security Incident
- 25 Years Later: Looking Back at the First Great ...
- 2018 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
- Do not look for Cheap Black Friday Deal Testing - EvilTester.com
- The Difference Between Security and Privacy | Daniel Miessler
- Major US newspapers crippled by Ryuk ransomware attack | CSO Online
- Japan seeks cyberattacks to be in scope of security treaty with U.S. - Japan Today
- Why Automation Matters : Consistent Test Environments | The ORACLE-BASE Blog
- Easy PXE boot testing with only HTTP using iPXE and libvirt
- 10 ways to use OneNote for Project Management - SharePoint Maven
- Extend the evaluation period of Windows Server 2012/2016 and 2019 - ivobeerens.nl
- Recognizing Vendor Risks to National Security in the CFIUS Process - Lawfare
- How the Boston Children’s Hospital Is Innovating on Top of an Open Cloud
- 7 Nginx Rewrite Rule Examples with Reg-Ex and Flags
- The Developer Coefficient
- Yammer Seen Counts for Conversations – All About I.T.
- The two most important ways to defend against security threats | CSO Online
- Introduction to Cryptography Basic Principles
- weblogic - how to change listen port from default 7001 to something different? - Stack Overflow
- How to change the default port of weblogic (7001) (BEA/Weblogic forum at Coderanch)
- 10 Google Docs Tips That Take Seconds and Save You Time
- Launching Rational Cybersecurity for the Business | Security Architects Partners Dan Blum
- Erman Arslan's Oracle Blog: RDBMS -- TLS 1.2 support and issues ORA-29263: HTTP protocol error & ORA-29024: Certificate validation failure
- Erman Arslan's Oracle Blog: Oracle Seminar -- Oracle Technologies and Oracle Products + Oracle Job roles
- Erman Arslan's Oracle Blog: Exadata -- Exadata X3 reimaging problem -- biosbootorder
- Erman Arslan's Oracle Blog: Weblogic -- Performance problem - Forms & Reports environment -- Unable to load performance pack / libmuxer.so
- Change the Listen Port for Weblogic AdminServer #Oracle #IDM #Identity - TUMY | TECH
- Erman Arslan's Oracle Blog: Weblogic -- HACMP Configuration, IP Address Change
- The Finnish Hyperion Guy: Tidy Up WebLogic Server After EPM System Installation
- Vulnerability Management Part 1 I Pivot Point Security
- Yes: Your Law Firm Needs to Do a Business Impact Analysis | Pivot Point Security
- WebLogic AdminServer Port Conflict Remote Running on PC
- Java mon amour: Installing JIRA
- Java mon amour: Jboss CLI, change individual attributes of a security domain without having to remove and add the domain from scratch
- Java mon amour: java showSettings
- Default Port Numbers You Need to Know as an Administrator
- Why Tenable/NESSUS requires full level 15 access for Cisco devices? Don’t need it.
- Security/TLS Configurations - MozillaWiki
- Security/Server Side TLS - MozillaWiki
- Transport Layer Protection Cheat Sheet - OWASP
- Oracle – Got minus one from a read call – How to tackle? | {"code":"java"}
- Come Across: Presenting : Explore and Implement SharePoint Security: Permissions, Identities, and Objects @ NCS SharePoint CoP Group
- Security Update Guide
- CyGraph: Cybersecurity Situational Awareness That’s More Scalable, Flexible & Comprehensive - Neo4j Graph Database Platform
- TDS Endpoints: SQL Server's "Listener" | ColleenMorrow.com
- Private Investigator - Stillinger investigations
- How a U.S. Health Care System Uses 15-Minute Huddles to Keep 23 Hospitals Aligned
- Automotive Cybersecurity
- CDRH’s Medical Device Safety Action Plan – An Aspirational Blueprint for Addressing Medical Device Safety | Health Law | STAT
- Thora A. Johnson
- Active Directory® 101 - JumpCloud
- How to check if your processor supports Virtualization Technology on Ubuntu
- Chris's Wiki :: blog/linux/ZFSFileserverSameness
- Malwarebytes IT Security Predictions 2019 | Born's Tech and Windows World
- Serverless OpenLDAP™ - Security Boulevard
- The Best of Shape Security 2018 - Security Boulevard
- OPTPOLINES - Formerly Relpolines, Lower Overhead To Retpolines For Spectre Mitigation - Phoronix
- Local stratum-1 NTP server
- Ubiquiti Unifi setup
- Touchless health monitoring module works with Raspberry Pi
- Home - ROI-NJ
- MacOS Security Baseline Script – JerryGamblin.com
- Favorite Security Books Of 2018 – JerryGamblin.com
- Welcome to ServerlessSecurity.org! | ServerlessSecurity.org
- Host Websites On Github – JerryGamblin.com
- SQL Server 2014 Service Pack 3 is now Available!!! | SQL Server Release Services
- Adam Shostack's personal homepage
- The Hard Truth About G2A, Kinguin and Grey Market Keys – Locke's Journey
- Understanding the unique Israeli concept of Rosh Gadol (ראש גדול)-updated | Allon Shevat
- News – Joel on Software
- GitHub - cybermaggedon/cyberprobe: Capturing, analysing and responding to cyber attacks
- What Are Cipher Suites? - Security Boulevard
- Jacek Kowalczyk / my-debian · GitLab
- Looking Back at the Top Cyber-Securities Issues of 2018
- Cyber and Technology Resilience: Themes from cross-sector survey 2017 - 2018 - technology-cyber-resilience-questionnaire-cross-sector-report.pdf
- The Life of Kenneth: FCIX - State of the Exchange
- On Thinking About Infrastructure as Code - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Hilbert’s list | Seth's Blog
- 1. High efficiency, sustainable method for growing sufficient food, including market-shifting replacements for animals as food
2. High efficiency, renewable energy sources and useful batteries (cost, weight, efficiency)
3. Effective approaches to human trafficking
4. Carbon sequestration at scale
5. Breakthrough form for democracy in a digital age
6. Scalable, profitable, sustainable methods for small-scale creators of intellectual property
7. Replacement for the University
8. Useful methods for enhancing, scaling or replacing primary education, particularly literacy
9. Beneficial man/machine interface (post Xerox Parc)
10. Cost efficient housing at scale
11. Useful response to urban congestion
12. Gene therapies for obesity, cancer and chronic degenerative diseases
13. Dramatic leaps of AI interactions with humans
14. Alternatives to paid labor for most humans
15. Successful interactions with intelligent species off Earth
16. Self-cloning of organs for replacement
17. Cultural and nation-state conflict resolution and de-escalation
18. Dramatically new artistic methods for expression
19. Useful enhancements to intellect and mind for individuals
20. Shift in approach to end-of-life suffering and solutions for pain
21. Enhanced peer-to-peer communication technologies approaching the feeling of telepathy
22. Transmutation of matter to different elements and structures
23. Off-planet outposts
It’s going to get interesting. Especially if we can imagine it.
- Cybersecurity and Insurance | Hackaday
- Patch Lady – vendors start to shut the doors on Windows 7 @ AskWoody
- Find Windows 10 Upgrade Blockers with PowerShell – smsagent
- FYI: End of Support for Windows 7, SQL-Server 2008 and more | Born's Tech and Windows World
- Effective Mental Models for Code and Systems – Cindy Sridharan – Medium
- The Art of Vacuum Tube Fabrication | Hackaday
- configuring_ssl_for_oracle_client_with_cac_using_mcs_3.pdf
- GitHub - pmdba/plsql-pii-scanner: An example of a method for scanning the Oracle data dictionary for potential PII data and automating specific responses, such as encrypting of columns or alerting the DBA, when new data is found.
- Finding And Fixing Node.js Memory Leaks: A Practical Guide | eknori.de
- Firejail - Securely Run Untrusted Applications in Linux
- I Hunt Sys Admins - The Intercept
- How China’s Elite APT10 Hackers Stole the World’s Secrets | WIRED
- How To Organize Your Income And Expenses
- How VMware Certifications changed my life -
- Getting started with chaos engineering | Opensource.com
- Chris's Wiki :: blog/linux/ZFSFileserverSetupIII
- Creating a useful spec | Seth's Blog
- NASA Astronomer Nancy Grace Roman, 'Mother' Of Hubble Space Telescope, Is Dead : NPR
- PostgreSQL-Diagnostic-Queries – DB-Tune
- Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers - Latest Hacking News
- EU offers bounties to help find security flaws in open source tools
- Malware stalls delivery of LA Times and other major US newspapers
- Linux ip Command Examples - nixCraft
- Azure in the Government of Canada - Eric’s Azure Blog
- Penetration Testing on Group Policy Preferences
- From Encrypting the Web to Encrypting the Net: 2018 Year in Review | Electronic Frontier Foundation
- Side-Channel Vulnerability Variants 3a and 4 - Spectre and Meltdown - blackMORE Ops
- Building a PowerShell Process Memory Tool • The Lonely Administrator
- How to add network driver to Windows 10 PE | Marco Franssen
- Put your ssh experience in Windows on Steroids | Marco Franssen
- DSHR's Blog: Securing The Hardware Supply Chain
- Top 5 Cybersecurity Priorities for 2019: Ponemon Study - Blog | Tenable®
- Healthcare Data Breaches Associated with 64% Increase in Advertising Expenditures - Security Boulevard
- Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018
- Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018 - Security Boulevard
- Healthcare Cybersecurity in 2019: The Time is Now - Security Boulevard
- Top 20 Most Popular Hacking Tools in 2018 - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Improving DNS logging, dnstap on Ubuntu - Koen Van Impe - vanimpe.eu
- Data Sanitization 5.3 release | OPSWAT
- The Year of the GDPR: 2018’s Most Famous Privacy Regulation in Review | Electronic Frontier Foundation
- Blog Exploits on the Rise | Onapsis
- Selenium IDE Tactical or Strategic? - Evil Tester - Technical Testing with Skill, Attitude and Pragmatism
- Looking Back: 2018 Project Report Card - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- An Internet Outage Could Kick In WannaCry Ransomware Again
- The elements of cybersecurity hygiene and secure networks -- Part 2
- The elements of cybersecurity hygiene and secure networks -- Part 1
- Cuckoo – Sandboxed Malware Analysis – ls /blog
- Chris's Wiki :: blog/sysadmin/MetricsAndUnderstandingMore
- The Best Maker YouTube Channels | Cool Tools
- Intel 5500 chipset heatsink tuning
- Smokeping – network latency monitor with Raspberry Pi – Alexander's Blog
- Context: Your Super-Weapon in Vulnerability Management? - Security Boulevard
- Industrial Control Systems Healthcheck | Mandiant | FireEye
- PCI Pal and Verizon White Paper Examines PCI Security Compliance in Contact Centre Environments - Security Boulevard
- Apache Struts Vulnerabilities vs Spring Vulnerabilities — One of these popular open source projects might be riskier than the other - Security Boulevard
- Defense in Depth: 4 Essential Layers of ICS Security
- AWS Lambda Security Quick-Start Guide
- Secure & Compliant Payment Solutions for Contact Centres | PCI Pal
- OWASP Top 10 Security Risks – Part II - Security Boulevard
- Software Monitoring for NERC CIP Compliance: Part 1
- Continuous Monitoring : Academic Paper - Security Boulevard
- OWASP Top 10 Vulnerabilities List — You’re Probably Using It Wrong
- A Brief Introduction to the OpenVAS Vulnerability Scanner
- Tis the Season to Check your SSL/TLS Cipher List Thrice (RCurl/curl/openssl) - Security Boulevard
- Cybersecurity is Increasingly Important for M&A Dealmakers - Security Boulevard
- PIPEDA & MDR: Breaches, Reporting and Advice
- Shared responsibility model: Who owns cloud security? - Security Boulevard
- RACI matrix in ISO 27001 implementation – How to use it?
- Negative Impact of Incorrect CSP Implementations - Security Boulevard
- Future Crimes by Marc Goodman (Book Summary) - Security Boulevard
- 37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says - Security Boulevard
- PIPEDA Best Practices Achieved with MDR - Part 2 - Security Boulevard
- PIPEDA Best Practices Achieved with MDR - Security Boulevard
- Achieve CIS Compliance in Cloud, Container and DevOps Environments
- FreeRADIUS for MSPs - Security Boulevard
- Ten Ways Your Healthcare Org May Be Violating HIPAA - Security Boulevard
- 36 Best Business Books that Changed Microsoft Leaders’ Lives – J.D. Meier's Blog
- How I Became A Believer In Consuming IT Security As A Service - Security Boulevard
- 5 lessons public wi-fi can teach us about cybersecurity - Security Boulevard
- Apache Struts Vulnerabilities Burden Us With a ‘Stay or Go’ Deliberation - Security Boulevard
- A Little Guide to SMB Enumeration
- NHS is still assessing the cost of WannaCry one year laterSecurity Affairs
- CompTIA A+ Renewal Process - Security Boulevard
- Security Vulnerability in Internet-Connected Construction Cranes - Schneier on Security
- How to Enable HTTP/2 in Nginx
- Spectre mitigation guts Linux 4.20 performance – Naked Security
- InfoSec Handlers Diary Blog - Restricting PowerShell Capabilities with NetSh
- Pedagogic-cybersecurity-framework.pdf
- 6 years of Raspberry Pi in video | Opensource.com
- stoQ - An Open Source Framework For Enterprise Level Automated Analysis - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- 6 Ways to Anger Attackers on Your Network
- Reddit helps admin solve mystery of rogue Raspberry Pi – Naked Security
- Why a Helium Leak Disabled Every iPhone in a Medical Facility - Motherboard
- ꓘamerka — Build interactive map of cameras from Shodan
- Here's How Easy It Is to Make Your Own IMSI-Catcher
- Libvirt Fencing on a Physical KVM Host | Lisenet.com :: Linux | Security | Networking
- Yubico Security Key Review (The complete edition)
- SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Understanding the 7 different types of data breaches - Security Boulevard
- Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge - Security Boulevard
- Star WannaCry victim NHS to ban fax machines by 2020 - Security Boulevard
- New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
- New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
- Notes on Build Hardening - Security Boulevard
- 5 Key Components Every Company Should Have in Their Privacy Policy - Security Boulevard
- The Top 5 Third-Party Cyber Gaps of 2018 - Security Boulevard
- Ahead of the Curve: University Incident Response Plans and Communications - Security Boulevard
- OWASP 'ServerlessGoat': A Vulnerable Demo Serverless Application - Security Boulevard
- The Year Ahead: Cybersecurity Trends To Look Out for In 2019 - Security Boulevard
- What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3? - Security Boulevard
- Why TLS 1.3 is a Huge Improvement - Security Boulevard
- Strategic Ways to Add Value to Your IT Consulting Business
- Beyond Scanning: Don’t Let AppSec Ignorance Become Negligence - Security Boulevard
- GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019 - Security Boulevard
- Want Your R&D Team to Rock? 7 Tips to Help Your Developers Perform Like a Supergroup - Security Boulevard
- Top 30 Supervisory Control and Data Acquisition (SCADA) Technician Interview Questions and Answers for 2019 - Security Boulevard
- 3 Reasons Osquery Should Be On Every Incident Responders Christmas List - Security Boulevard
- Healthcare Cybersecurity in Intensive Care - Security Boulevard
- Flaws and Vulnerabilities and Exploits – Oh My! - Security Boulevard
- 5 tips to secure your supply chain from cyberattacks - TechRepublic
- We Asked 105 Experts What Worries Them Most About the Future - Motherboard
- testssl.sh - Testing TLS/SSL Encryption Anywhere On Any Port - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- XSStrike v3.0 - Most Advanced XSS Detection Suite - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Lynis 2.7.0 - Security Auditing Tool for Unix/Linux Systems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CAINE 10.0 - GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CRS - OWASP ModSecurity Core Rule Set - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The 4 phases of a business continuity plan - IT Governance Blog
- List of data breaches and cyber attacks in November 2018 - 251,286,753 records leaked - IT Governance Blog
- How to create a business continuity plan – with free template - IT Governance Blog
- How to build a cyber incident response team - IT Governance Blog
- 7 of the most common cyber attacks you need to prepare for - IT Governance Blog
- Your checklist for responding to and reporting data breaches - IT Governance Blog
- 10 things you must do to become cyber secure - IT Governance Blog
- Your DPO questions answered in an interview with information security experts - IT Governance Blog
- Phishing, Ransomware Attacks Continue to Menace Healthcare
- Why NIST is so popular in Japan
- 7 CI/CD tools for sysadmins | Opensource.com
- Australia's new 'decryption' law and its effect on tech companies worldwide
- HOWTO: Calculate Elapsed Business Hours Using PowerShell – Please Work
- Network UPS Tools | Calvin Bui
- VMware vSphere Security - Getting Started Hands-on Lab
- People First – The Frequently Overlooked Importance of Culture Change in DevOps Journeys – Premier Developer
- Colorado Embraces New IT Security Philosophy
- Zero Trust part 1: Identity and access management - Microsoft Secure
- StarWind rPerf free tool • Nolabnoparty
- HTTP vs HTTPS – lakkireddymadhu
- How protected are you against cyber-attacks? – lakkireddymadhu
- All major browsers drop TLS 1.0 and 1.1 in 2020 – lakkireddymadhu
- How To Set Up Nginx with HTTP/2 Support on Ubuntu 16.04 | DigitalOcean
- HTTP/2 – lakkireddymadhu
- World Computer Security Day – lakkireddymadhu
- How to Find Hidden & Saved Passwords in Windows 10 – lakkireddymadhu
- How to Be Invisible Online (Without Going off the Grid) – lakkireddymadhu
- Visibility vs Results | The ORACLE-BASE Blog
- 10 Cybersecurity Myths – lakkireddymadhu
- Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition) – David Vassallo's Blog
- Find email addresses in seconds • Hunter (Email Hunter)
- HTTP/3 – lakkireddymadhu
- HHS Deputy Secretary Eric Hargan Describes Cyber Initiative
- Analysis: Did Anthem’s Security ‘Certification’ Have Value?
- Health Data Breach Tally: Analyzing the Latest Trends
- Getting Started with Desired State Configuration Resources for VMware - VMware PowerCLI Blog - VMware Blogs
- Medical Devices: The Long Road to Security - HealthcareInfoSecurity
- 5 – 15s DNS lookups on Kubernetes? – Quentin
- Marriott: Data on 500 Million Guests Stolen in 4-Year Breach — Krebs on Security
- Installing metasploitable with vagrant
- What the Marriott Breach Says About Security — Krebs on Security
- HHS Seeks Feedback on Potential HIPAA Changes
- Incident Response: Why a Tabletop Exercise Is Essential
- SlithIR · trailofbits/slither Wiki · GitHub
- Slither – a Solidity static analysis framework | Trail of Bits Blog
- Cybersecurity Trends to Watch Out for in 2019 | Webroot
- Windows Incident Response: Veteran Skillz
- GDPR Compliance: The Role of Vendor Risk Management
- Does HIPAA Need to Be ‘Modernized’? - HealthcareInfoSecurity
- What is a VMware VIB file?
- How to Patch vCenter Server Appliance (VCSA) - [Guide] | ESX Virtualization
- I just setup WireGuard, and I’ll never go back to OpenVPN | Logan Marchione
- Windows Incident Response: Basic Skillz, pt II
- Windows Incident Response: Basic Skillz
- Though 2018 Will Likely Not Surpass 2017 Numbers – Still Significant Year For Breach Activity
- On Pace To Break 20k Mark For Disclosed Vulnerabilities
- Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- Visualise Event Logs to Identify Compromised Accounts - LogonTracer - - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- What Is the OBD-II Port and What Is It Used For?
- 5 Cybersecurity Predictions for 2019
- Cyber Security Lessons from Abroad – Australia’s Essential Eight
- Addressing the CISO’s Key Challenges in 2018 and Beyond with Endpoint Detection and Response
- Multiple Ways To Exploiting HTTP Authentication
- ODA : Free up space on local filesystems - Blog dbi services
- 2018 in cybersecurity: Regrets, we have a few
- How To Install OpenLDAP Server for Centralized Authentication
- Listen to the radio at the Linux terminal | Opensource.com
- Web Proxy Penetration Lab Setup Testing using Squid
- Hack the Box: Jerry Walkthrough
- Comprehensive Guide on Dirbuster Tool
- HTTP Banner Grabbing Beyond The Root - DigiNinja
- Nessus Through SOCKS Through Meterpreter - DigiNinja
- Blog, Integrating GNS3 and VirtualBox - DigiNinja
- Wifi Honey - DigiNinja
- Multiple Ways to Exploit Tomcat Manager
- Thanos: long-term storage for your Prometheus Metrics on OpenShift – Red Hat OpenShift Blog
- FAIRCON Showcases Quantitative Risk Analysis on the Cusp of Adoption | Security Architects Partners
- How to Establish a Security Culture | Security Architects Partners
- Securezoo Articles
- Routes-apply.sh - Safely apply routes and revert on error | Sebastian Neef - 0day.work
- Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough
- Here are the most common cyber security threats that occur in the healthcare sector
- 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 1)
- 7 Ways an Old Tool Still Teaches New Lessons About ...
- 9 Traits of A Strong Infosec Resume
- 7 Free (or Cheap) Ways to Increase Your ...
- 6 Python and containers videos worth watching | Opensource.com
- Patching the vCenter Server Appliance (VCSA) using the REST API
- Dream of augmented humans endures, despite skeptics - Japan Today
- How To Install IIS In Windows Server 2019 - RootUsers
- How To Enable Remote Desktop In Windows Server 2019 - RootUsers
- U.S. GAO - Information Security: Significant Progress Made, but CDC Needs to Take Further Action to Resolve Control Deficiencies and Improve Its Program
- DSHR's Blog: Securing The Software Supply Chain
- U.S. GAO - Federal Building Security: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control
- U.S. GAO - Information Security: Agencies Need to Improve Implementation of Federal Approach to Securing Systems and Protecting against Intrusions
- SQL Server Linux: fsync and Buffered I/O – SQL Server According to Bob
- SQL Server On Linux: Forced Unit Access (Fua) Internals – SQL Server According to Bob
- How to become an AWS expert | AWS News Blog
- Serverless and startups, the beginning of a beautiful friendship | AWS News Blog
- ESXi 6.5.0 fails to boot with Error loading /a.b00 – Virtually Sober
- How to Enable TLS 1.3 in Nginx
- Security operations activities to watch in 2019 | CSO Online
- The Difference Between a Penetration Test and a Red Team Engagement | Daniel Miessler
- Automating a DevOps-Friendly Security Policy
- A Container Hacker’s Guide to Living Off of the Land – Professionally Evil Insights
- Measuring container security [LWN.net]
- Security Considerations for Container Runtimes - RHD Blog
- Deploying SQL Server on K8s with Helm charts
- Virtual Patching or Good Security Design instead?
- A checklist for overcoming life and career setbacks - 80,000 Hours
- A year's worth of education for under a dollar and other 'best buys' in development, from the UK aid agency's Chief Economist - 80,000 Hours
- Response: A Chief Security Concern for Executive Teams - EtherealMind
- Zen of Routing Protocols « ipSpace.net blog
- Red Hat Global Customer Tech Outlook 2019: Automation, cloud, & security lead funding priorities
- A Chief Security Concern for Executive Teams — Krebs on Security
- 5 Dedicated Server Security Vulnerabilities and How to Troubleshoot Them – ThisHosting.Rocks
- HardenedBSD 12 Released With Jailed Bhyve, Disables SMT By Default - Phoronix
- Closing the Global Cyber Enforcement Gap - Lawfare
- NASA discloses October security breach
- The US ballistic missile system is a cybersecurity nightmare
- Errata Security: Masscan as a lesson in TCP/IP